Analysis
-
max time kernel
139s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-04-2022 04:53
Static task
static1
Behavioral task
behavioral1
Sample
f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe
Resource
win10v2004-20220414-en
General
-
Target
f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe
-
Size
1.6MB
-
MD5
e61584555e51380572f761c8d05b44e7
-
SHA1
48cd82d6aafc9413915315f495079eaea8701a7f
-
SHA256
f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6
-
SHA512
21dd91d23e7ae017427f8dbe6f13e435fcf330ea514d8551c796d9ad1178657d3f034a00a3b2e9362fa691db1753fc5ed1dc58b6772f23469c9a778f0e469349
Malware Config
Signatures
-
Panda Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/3176-131-0x0000000000900000-0x0000000000CD3000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Wine f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3176 f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3176 f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe 3176 f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe 3176 f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe 3176 f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe"C:\Users\Admin\AppData\Local\Temp\f8478d278e0557a435b569a5cd8a853a910b81d1d5ca5a53e1acd4e341442fd6.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3176